Lean Security Method - *Co-Author this Book*

What is the Lean Security Method?

The lean security method is a step by step guide to help small businesses, startups, and individuals apply security protocols to their digital assets and digital identities on a budget. It’s common for companies to protect themselves against cyber attacks yet 1 in 3 people will be a victim of identity theft in the USA.

This means attacks against the person are on the rise. While attacks against the person typically result in financial frauds or financial loss that can have significant long term consequences.

The goal of the Lean Security Method is to answering the question.

How do small business, startup’s or individual’s on a budget protect themselves against cyber attacks and become security resilient?

Why this question?

Right now there is a resurgence of small businesses launching due to transition or displacement created because of the COVID-19 pandemic. However in the made scrabble to launch and monetize your business cybersecurity often becomes an after through or something you will get to later.

A “small business” may be the person who is now working as a consultant, or people working remotely but no longer as the employee of a specific company. It could be the social media influencer who wants to protect themselves and the brand they are creating against identity theft, or data theft that would impact their brand.

It could be the people researching, or creating new solutions for problems. These people need to protect their intellectual property from being stolen to ensure they can maximize the value of their work when the time comes.

Just because you are a startup or consultant does not mean you need to become a victim of cyber crime.

The Lean Security Method provides you with the step by step blueprint on helping you protect yourself, your business and your assets against cyberattack on a budget.

There are several small steps you can take to implement Cybersecurity protection protocols into your business from the beginning helping you become more resilient against cyberattacks which are on the rise. Making the right choices now, and asking the right questions can result in your business growing faster.


[This is where you can suggest topics by commenting below. What topics should be in this book and why?]

  1. 3 cybersecurity myths
  2. How to protect your Crown Jewels
  3. Securing your email
  4. Securing your devices
  5. How to respond to a security incident
  6. Security Awareness training
  7. Securing your social media accounts
  8. Using security posture to win new business
  9. Protecting your website [protecting your website against attack]
  10. Where’s my data? [Talking about backups and recovery]
  11. What cyber technologies are worth the effort and which are not?
  12. What is an appropriate budget per endpoint annually?
  13. How do you know what technologies implemented are actually working?

Get Published in our book

CybersecurityQnA is crowdsourcing several books that will be published when completed. If you want to contribute to this book and be recognized as an author in the book. All you need to do is contribute to a page, chapter or section within the book. The book will be written as a series of community posts. You can choose to expand on a specific chapter topic, reply to a chapter post with comments and additional ideas that can be incorporated into the book.

Please help us by suggesting topics, and commenting on the ideas below. Your contribution may be used in the final book when it’s published giving you Co-Author credibility.

From: Moses Botbol via Linkedin

What cyber technologies are worth the effort and which are not?
What is an appropriate budget per endpoint annually?
How do you know what technologies implemented are actually working?

Great project and the idea of everyone being able to contribute to this book is quite stimulating. As the booklet (or maybe book if hopefully, you’ll have many contributors) is meant to address small businesses there are quite a lot of people who become quite reluctant on the topic of cybersecurity for it means boredom and techies. This could be partly true, therefore it might be a good thing to have a paragraph reminding that cybersecurity begins with physical security (location of the server or servers, access to that location etc…).